Experienced professional with a background in automation and manual penetration testing. Demonstrates a strong understanding of Network, Website, and Application Security. Skilled in conducting Vulnerabilities Assessment and Penetration Testing, with expertise in managing information assurance evaluation tests. Possesses a solid grasp of information security and applied cryptographic protocols, along with proficiency in all operating systems. Demonstrates the ability to exploit recognized vulnerabilities to enhance overall security measures.
VAPT Specialist | Web Application | Mobile Application | Network Infrastructure | WiFi Hacking VAPT
VAPT Specialist | Web Application | Mobile Application | Network Infrastructure | WiFi Hacking VAPT
Profound knowledge of Security & All Vulnerabilities Assessment and Penetration Testing
OWASP top attacks with their detection
Sound knowledge in Metasploit Framework and Social Engineering
Hands on experience of security appliances like Firewalls, Servers, Routers
Good practice to perform Windows and Linux
CEH ( EC-Council
Perform formal penetration tests on Web-based applications, Networks, Wifi and computer systems. Conduct physical security assessments of servers, systems and network devices.
Probe for vulnerabilities in web applications, fat/thin client applications and standard applications.
Pinpoint methods that attackers could use to exploit weaknesses and logic flaws.
Employ social engineering to uncover security holes (e.g. poor user security practices or password policies).
Research, document and discuss security findings with management and IT teams. Review and define requirements for information security solutions.
Work on improvements for security services, including the continuous enhancement of existing methodology material and supporting assets.
Provide feedback and verification as an organization fixes security issues.
Awards | Achievements | Special Thanks | Appreciation
Mile2 Cyber security
CEH ( EC-Council